Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60800: n/a

0
Unknown
VulnerabilityCVE-2025-60800cvecve-2025-60800
Published: Tue Oct 28 2025 (10/28/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Incorrect access control in the /jshERP-boot/user/info interface of jshERP up to commit 90c411a allows attackers to access sensitive information via a crafted GET request.

AI-Powered Analysis

AILast updated: 10/28/2025, 17:47:29 UTC

Technical Analysis

CVE-2025-60800 identifies an incorrect access control vulnerability in the jshERP software, specifically in the /jshERP-boot/user/info interface. This vulnerability allows an attacker to bypass authentication mechanisms and access sensitive user information by sending a specially crafted GET request. The flaw exists in all versions of jshERP up to commit 90c411a. The vulnerability arises from insufficient validation of user privileges on the endpoint, enabling unauthorized data retrieval. No authentication or user interaction is required, which significantly lowers the barrier for exploitation. Although there are no known exploits in the wild at the time of publication, the vulnerability poses a serious risk to confidentiality, as sensitive user data could be exposed to unauthorized parties. The absence of a CVSS score complicates severity assessment, but the nature of the flaw suggests a high impact due to potential data leakage. The vulnerability affects organizations using jshERP, which is an ERP solution commonly deployed in small to medium enterprises and some public sector entities. The lack of available patches at the time of reporting means organizations must rely on interim controls such as network segmentation, access restrictions, and monitoring to mitigate risk. Once patches or updates are released, prompt application is critical to prevent exploitation.

Potential Impact

The primary impact of CVE-2025-60800 is unauthorized disclosure of sensitive user information, which compromises confidentiality. For European organizations, this could lead to exposure of personal data protected under GDPR, resulting in regulatory penalties and reputational damage. The vulnerability could be exploited by external attackers or malicious insiders to gain insights into user accounts or system configurations, potentially facilitating further attacks. Since no authentication is required, the attack surface is broad, increasing the likelihood of exploitation if the endpoint is exposed externally. The integrity and availability of systems are not directly affected, but the breach of confidentiality alone can have severe consequences, including loss of customer trust and competitive disadvantage. Organizations in sectors handling sensitive personal or financial data are particularly vulnerable. Additionally, the lack of known exploits suggests a window of opportunity for defenders to act before widespread attacks occur.

Mitigation Recommendations

1. Immediately restrict access to the /jshERP-boot/user/info endpoint by implementing network-level controls such as firewalls or VPNs, limiting access to trusted internal IP addresses only. 2. Monitor access logs for unusual or unauthorized GET requests targeting the vulnerable endpoint to detect potential exploitation attempts early. 3. Employ Web Application Firewalls (WAFs) with custom rules to block suspicious requests that attempt to access sensitive user information without proper authentication. 4. Coordinate with the jshERP vendor or community to obtain and apply patches or updates addressing the vulnerability as soon as they become available. 5. Conduct thorough vulnerability scans and penetration tests focusing on access control weaknesses in ERP systems to identify similar issues. 6. Educate IT and security teams about this vulnerability to ensure rapid response and remediation. 7. Consider implementing additional authentication or authorization checks at the application layer as a temporary mitigation if patching is delayed. 8. Review and enforce strict data minimization and access policies within jshERP to limit sensitive data exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6900ffacc2498ce55d2bf488

Added to database: 10/28/2025, 5:38:52 PM

Last enriched: 10/28/2025, 5:47:29 PM

Last updated: 10/29/2025, 6:34:26 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats